Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
An Overview of Contemporary Cyberspace Activities and the ChallengingCyberspace Crimes/Threats

An Overview of Contemporary Cyberspace Activities and the ChallengingCyberspace Crimes/Threats

Ratings: (0)|Views: 11|Likes:
Published by ijcsis
One thing that has emanated from the development of the internet technology and popular embrace of social networking is the emergence of a second digital world which is a virtual reality world called the cyberspace. The cyberspace users who can be described as the Cyberians are attracted to the cyberspace from time to time especially because of the various opportunities/activities available via the cyberspace cutting across many spheres of human endeavor. There are however many threats or challenges which may be inimical to the safety of the cyberspace, the cyberspace assets/resources and the interest of the Cyberians, the regular cyberspace users or cyber citizens. This paper, based on extensive examination of contemporary literature on the cyberspace, explores fundamental activities of the cyberspace and explicates various forms of cybercrimes orchestrated by cyber criminals posing great threats to the cyberspace. The basic ideas of the paper are equally captured in vivid illustrative models.
One thing that has emanated from the development of the internet technology and popular embrace of social networking is the emergence of a second digital world which is a virtual reality world called the cyberspace. The cyberspace users who can be described as the Cyberians are attracted to the cyberspace from time to time especially because of the various opportunities/activities available via the cyberspace cutting across many spheres of human endeavor. There are however many threats or challenges which may be inimical to the safety of the cyberspace, the cyberspace assets/resources and the interest of the Cyberians, the regular cyberspace users or cyber citizens. This paper, based on extensive examination of contemporary literature on the cyberspace, explores fundamental activities of the cyberspace and explicates various forms of cybercrimes orchestrated by cyber criminals posing great threats to the cyberspace. The basic ideas of the paper are equally captured in vivid illustrative models.

More info:

Published by: ijcsis on May 03, 2014
Copyright:Traditional Copyright: All rights reserved

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/03/2014

pdf

text

original

 
 
An Overview of Contemporary Cyberspace Activities and the Challenging Cyberspace Crimes/Threats
By Samson Olasunkanmi Oluga* Dr Azizah Bt Haji Ahmad Ahmad Jamah Ahmad Alnagrat Haroon Shakirat Oluwatosin Maryam Omar Abdullah Sawad Nur Adlya Bt Muktar Of School of Computing (SOC) College of Arts and Sciences (CAS) Universiti Utara Malaysia 06010 Sintok, Kedah Malaysia
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 3, March 201462http://sites.google.com/site/ijcsis/ ISSN 1947-5500
 
 
Abstract
One thing that has emanated from the development of the internet technology and popular embrace of social networking is the emergence of a second digital world which is a virtual reality world called the cyberspace. The cyberspace users who can be described as the
Cyberians
are attracted to the cyberspace from time to time especially because of the various opportunities/activities available via the cyberspace cutting across many spheres of human endeavor. There are however many threats or challenges which may be inimical to the safety of the cyberspace, the cyberspace assets/resources and the interest of the
Cyberians
, the regular cyberspace users or cyber citizens. This paper, based on extensive examination of contemporary literature on the cyberspace, explores fundamental activities of the cyberspace and explicates various forms of cybercrimes orchestrated by cyber criminals posing great threats to the cyberspace. The basic ideas of the paper are equally captured in vivid illustrative models. Keywords: Cyberspace, Cyber activities, Cybercrimes/Threats
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 3, March 201463http://sites.google.com/site/ijcsis/ ISSN 1947-5500
 
 
Introduction/Background
It is axiomatic that the present age of humankind is a computer technology age where virtually all aspect of human activities are computerized or computer-based and basic tasks in most spheres of human endeavor are enhanced or better executed via the instrumentality of modern or state of the art computer technology. It is also crystal clear that the whole wide world is presently in a state of constant transformation courtesy of the advent of advanced computer technology breakthroughs that are systematically revolutionizing the human society. The interesting thing about today’s computer technology advancement orchestrated  by competitive wizards, working rigorously, independently or collaboratively, all over the globe but driven by the positive goal of making the world a better place, is the quick succession of contemporary computer-based innovations. Today, it will be highly unimaginable to think of life without computers or reverting to the  pre-computer technology age characterized basically by manual execution of human activities and expending a lot of time, energy, efforts or resources on given tasks only to attract minimal results or outcomes. On the other hand, the minimum input with maximal output that is characteristic of computer technology application makes it exceptionally rewarding and simply preferred especially by those who have chosen to be computer technology compliant and always abreast development. The computer/ICT based internet technologies  presently afford numerous end users myriads of opportunities online which are improved replicas or computerized versions of the traditional offline activities. It is in the light of the various online social, political, economic and educational activities as well as many others that computer technology/ICT has provided humankind a second world now described as the cyberspace. The word/term cyberspace has attracted a number of definitions or semantic interpretations especially by experts and lexicographers trying to shed more light on the meaning of the concept. This is characteristic of topical concepts or contemporary phenomena coming to limelight or arousing research interest. Cyberspace according to Adnan (2010) is an unreal world where information is constantly transmitted through or between computers. It is a web of private cum public computer networks. It is a geographical milieu of online conversations, email exchanges, flame wars, spam attacks and information dissemination or exchange. The cyberspace according to Pfaffenberger (2000) simply refers to the virtual space that computer systems have aided its creation, that is, the computer technology invented world. In a similar
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 3, March 201464http://sites.google.com/site/ijcsis/ ISSN 1947-5500

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->